Behavioral task
behavioral1
Sample
caa4e5a6e9762011cc0675350ad347191d42dcf17aadfed7736caaacfc8f5db7.exe
Resource
win7-20220812-en
General
-
Target
caa4e5a6e9762011cc0675350ad347191d42dcf17aadfed7736caaacfc8f5db7
-
Size
140KB
-
MD5
342c30086c80494698b9ec8731cf7136
-
SHA1
b1d4c5f8a9971c737cecb354c7fbdd58d5a612dc
-
SHA256
caa4e5a6e9762011cc0675350ad347191d42dcf17aadfed7736caaacfc8f5db7
-
SHA512
9df78e22bd29931f8004267c7c42671a14d74c1979688cf37f418981246a73274c197ca52f2b1926f82edd65956069b4a2e049cd3f5e962f68fe336a9196578d
-
SSDEEP
3072:TtxyRKMyCHLNiojqY2Bb7M5o75/Noe2gq:THyRNyQLNiobAhxNq
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
caa4e5a6e9762011cc0675350ad347191d42dcf17aadfed7736caaacfc8f5db7.exe windows x86
c8bad8ed85a3bdecdaeb75efbcaf5e41
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
SetFileAttributesA
CreateFileA
ReadFile
HeapAlloc
UnmapViewOfFile
FlushViewOfFile
SetFilePointer
LocalFree
LocalUnlock
WriteProcessMemory
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetCurrentProcess
GetModuleHandleA
LocalLock
LocalAlloc
HeapFree
CreateDirectoryA
DeleteFileA
GetFileAttributesA
FindNextFileA
FindFirstFileA
GetLogicalDrives
SetEndOfFile
GetLastError
CreateFileW
GetWindowsDirectoryW
GlobalLock
GetFileSize
GetDriveTypeA
FindNextFileW
FindFirstFileW
DeleteFileW
SetFileAttributesW
Process32Next
TerminateProcess
GetExitCodeProcess
Process32First
CreateToolhelp32Snapshot
OpenProcess
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileMappingA
MapViewOfFile
WriteFile
CloseHandle
GetVersionExA
GetProcessHeap
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
CreateThread
GlobalAlloc
Sleep
advapi32
QueryServiceStatus
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenServiceA
ControlService
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CreateServiceA
StartServiceA
RegDeleteValueA
ChangeServiceConfigA
QueryServiceConfigA
SetServiceStatus
CloseServiceHandle
OpenSCManagerA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
shell32
ShellExecuteA
ws2_32
WSAStartup
recv
send
closesocket
connect
htons
socket
sendto
htonl
inet_addr
ntohl
accept
recvfrom
__WSAFDIsSet
select
listen
bind
user32
ExitWindowsEx
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ